Exploring the Open Computer Forensics Architecture
Automate the forensics process with the Dutch police department's Open Computer Forensics Architecture.
Digital crime often puts the police under pressure. They don't have the staff to collect and analyze the volumes of digital evidence that often accompanies a large-scale investigation. At the same time, digital evidence is becoming increasingly important – data on mobile phones and computers belonging to suspects can provide circumstantial evidence and even hard facts. The Dutch police  developed the Open Computer Forensics Architecture (OCFA ) as an open source tool for professional criminal investigators. Dutch authorities use the modular OCFA framework for forensic investigations. The OCFA architecture is a combination of several existing forensic tools and libraries. OCFA splits the forensic process into two parts. First, specialists with knowledge of digital forensics extract content from hard disks and other devices. Then, criminal investigators use a simple web interface to analyze the data and look for evidence.
Installable OCFA 2.0.2 packages exist for Debian Etch, Ubuntu 5.10, and SUSE 9.3 and 10.1. The tarballs include OCFA RPMs or DEBs, along with a number of additional packages and installation guides, which also describe the packages you need to install manually up front. The current 2.1.0 version is available as a source package only. The creators of OCFA see the analysis process as a kind of digital data wash (Digiwash) and, therefore, install OCFA in the /usr/local/digiwash directory.
One of the biggest obstacles to forensic analysis is the sheer bulk of evidence. Investigators face the task of identifying incriminating material among hundreds of gigabytes of irrelevant data. But skipping files and directories just because the names sound nondescript is no solution either. Many forensic tools assist the investigator by performing automatic analysis and characterization of the identified files. Digiwash takes this idea one step further by running file to identify the file type. It then goes on to automatically analyze specific file types, thus saving the forensic investigator some of the grunt work. OCFA uses Lucene to index Microsoft Word files and other Office documents. The raw text is extracted by running antiword. PDF files are converted with pdftotext; mailwash extracts files and metadata from mailboxes. The developers have even devised a means for capturing the information in PGP keyrings, mapping the key IDs of signed and encrypted mail to clear text names. OCFA also groups photos and generates thumbnails.
The framework automatically dissects zipped containers and analyzes the files gained by this process. In this way, the framework recursively analyzes all the data and places it at the disposal of the investigators (Figure 1).
To reduce the volume of data for analysis, forensic investigators can integrate hash databases of known files. The databases contain MD5 or SHA1 checksums of files that investigators can safely ignore. For example, any unchanged files belonging to the operating system are bound to be irrelevant, although investigators will be interested in any modifications caused by trojans.
Databases of checksums for known files are available from the National Institute for Standards and Technology (NIST) as free downloads . Other forensic tools, such as Autopsy , also rely on the NIST's National Software Reference Library (NSRL). The library is available in zipped format as a collection of four CD images. A Perl script in the OCFA package references the ISO files to calculate its own hash sets, which the admin then has to copy to the digiwash directory. The conversion process takes some time to complete.
The router is a central part of the OCFA architecture that is responsible for recursive file processing, which it analyzes by calling external software before returning any files the process reveals to the analysis process (Figure 2). An anycast relay handles the communications between the individual modules. The relay coordinates messaging and also handles load balancing. This approach lets investigators run multiple instances of a module in a distributed environment on multiple computers; in other words, OCFA supports clustering.
Data recovered through OCFA is available to the forensic investigator at the command line. The investigator needs root privileges to initiate a case, because creating a new case involves restarting the Apache web server. From the web server's point of view, each case is a VirtualHost. The investigator then uses Apache to access the extracted data (Figure 3).
The interface also tells the investigator whether data extraction is complete. The web GUI shows the current queues and current status. In other words, OCFA actually automates communications between the investigator and the forensics expert.
The Dutch police have developed a Windows program for internal use. The program, dubbed Washbrush, analyzes Outlook and Outlook Express mailboxes and passes the results in to Digiwash. The program is only available to the Dutch authorities as of this writing. Work is also in progress on additional OCFA modules and a more state-of-art front end. The software will not be GPL'd, but it will be available via NDA (non-disclosure agreement).
Buy this article as PDF
Makes it easier for customers to move workloads into container-centric applications.
SUSE’s answer to container-centric operating systems.
Linux 4.9 is the biggest release in terms of number of commits.
The latest version of the official RHEL clone is here.
New release targets Linux professionals.
The Fedora project adds Wayland and Gnome 3.22
CeBIT 2017: Open Source Forum Call for Papers
Long-time Linux antagonist joins the revolution.
Major bug affects Debian/Ubuntu distributions.
Canonical releases the minimal edition for embedded devices, Internet of Things, and cloud deployments.